BibTeX records: Sven Schäge

download as .bib file

@article{DBLP:journals/iacr/CottaarHHLMPRSTW23,
  author       = {Jolijn Cottaar and
                  Kathrin H{\"{o}}velmanns and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Mohammad Mahzoun and
                  Alex Pellegrini and
                  Alberto Ravagnani and
                  Sven Sch{\"{a}}ge and
                  Monika Trimoska and
                  Benne de Weger},
  title        = {Report on evaluation of KpqC candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1853},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1853},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CottaarHHLMPRSTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanJKLPRS21,
  author       = {Shuai Han and
                  Tibor Jager and
                  Eike Kiltz and
                  Shengli Liu and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Authenticated Key Exchange and Signatures with Tight Security in the
                  Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {670--700},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_23},
  doi          = {10.1007/978-3-030-84259-8\_23},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanJKLPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JagerKRS21,
  author       = {Tibor Jager and
                  Eike Kiltz and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Tightly-Secure Authenticated Key Exchange, Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {117--146},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_5},
  doi          = {10.1007/978-3-030-77870-5\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JagerKRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingHHKSU21,
  author       = {Nico D{\"{o}}ttling and
                  Dominik Hartmann and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Bogdan Ursu},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {On the Impossibility of Purely Algebraic Signatures},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {317--349},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_11},
  doi          = {10.1007/978-3-030-90456-2\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingHHKSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingHHKSU21,
  author       = {Nico D{\"{o}}ttling and
                  Dominik Hartmann and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Bogdan Ursu},
  title        = {On the Impossibility of Short Algebraic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/738},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingHHKSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanJKLPRS21,
  author       = {Shuai Han and
                  Tibor Jager and
                  Eike Kiltz and
                  Shengli Liu and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  title        = {Authenticated Key Exchange and Signatures with Tight Security in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/863},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanJKLPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HovelmannsKSU20,
  author       = {Kathrin H{\"{o}}velmanns and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Dominique Unruh},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {389--422},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_14},
  doi          = {10.1007/978-3-030-45388-6\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HovelmannsKSU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchageSL20,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk and
                  Sebastian Lauer},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {567--596},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_20},
  doi          = {10.1007/978-3-030-45388-6\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchageSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKRS20,
  author       = {Tibor Jager and
                  Eike Kiltz and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  title        = {Tightly-Secure Authenticated Key Exchange, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1279},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1279},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchageSL20,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk and
                  Sebastian Lauer},
  title        = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1519},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1519},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SchageSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HovelmannsKSU18,
  author       = {Kathrin H{\"{o}}velmanns and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Dominique Unruh},
  title        = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/928},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HovelmannsKSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JagerKSS17,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Authenticated Confidential Channel Establishment and the Security
                  of {TLS-DHE}},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {1276--1324},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9248-2},
  doi          = {10.1007/S00145-016-9248-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JagerKSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiS17,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {No-Match Attacks and Robust Partnering Definitions: Defining Trivial
                  Attacks for Security Protocols is Not Trivial},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1343--1360},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134006},
  doi          = {10.1145/3133956.3134006},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiS17,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge},
  title        = {No-Match Attacks and Robust Partnering Definitions - Defining Trivial
                  Attacks for Security Protocols is Not Trivial},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {818},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/818},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HeuerJSK16,
  author       = {Felix Heuer and
                  Tibor Jager and
                  Sven Sch{\"{a}}ge and
                  Eike Kiltz},
  title        = {Selective opening security of practical public-key encryption schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {304--318},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0507},
  doi          = {10.1049/IET-IFS.2015.0507},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HeuerJSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaderJLS16,
  author       = {Christoph Bader and
                  Tibor Jager and
                  Yong Li and
                  Sven Sch{\"{a}}ge},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Impossibility of Tight Cryptographic Reductions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {273--304},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_10},
  doi          = {10.1007/978-3-662-49896-5\_10},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaderJLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerJKS16,
  author       = {Felix Heuer and
                  Tibor Jager and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge},
  title        = {On the Selective Opening Security of Practical Public-Key Encryption
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuerJKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Schage15,
  author       = {Sven Sch{\"{a}}ge},
  title        = {Tight Security for Signature Schemes Without Random Oracles},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {641--670},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9173-6},
  doi          = {10.1007/S00145-013-9173-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Schage15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Schage15,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{TOPAS:} 2-Pass Key Exchange with Full Perfect Forward Secrecy and
                  Optimal Communication Complexity},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1224--1235},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813683},
  doi          = {10.1145/2810103.2813683},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Schage15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeuerJKS15,
  author       = {Felix Heuer and
                  Tibor Jager and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge},
  editor       = {Jonathan Katz},
  title        = {On the Selective Opening Security of Practical Public-Key Encryption
                  Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {27--51},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_2},
  doi          = {10.1007/978-3-662-46447-2\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeuerJKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaderJLS15,
  author       = {Christoph Bader and
                  Tibor Jager and
                  Yong Li and
                  Sven Sch{\"{a}}ge},
  title        = {On the Impossibility of Tight Cryptographic Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/374},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaderJLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiSYBS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Christoph Bader and
                  J{\"{o}}rg Schwenk},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {New Modular Compilers for Authenticated Key Exchange},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_1},
  doi          = {10.1007/978-3-319-07536-5\_1},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiSYBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiSYKS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  editor       = {Hugo Krawczyk},
  title        = {On the Security of the Pre-shared Key Ciphersuites of {TLS}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {669--684},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_38},
  doi          = {10.1007/978-3-642-54631-0\_38},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiSYKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSYKS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  title        = {On the Security of the Pre-Shared Key Ciphersuites of {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/037},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSYKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlarSS13,
  author       = {Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {On the Security of {TLS-DH} and {TLS-RSA} in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohlarSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Schage12,
  author       = {Sven Sch{\"{a}}ge},
  title        = {Efficient and provably secure signature schemes in the standard model},
  school       = {Bochum University, Germany},
  year         = {2012},
  url          = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/509},
  urn          = {urn:nbn:de:hbz:294-35816},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Schage12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JagerKSS12,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {On the Security of {TLS-DHE} in the Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {273--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_17},
  doi          = {10.1007/978-3-642-32009-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JagerKSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schage12,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Strong Security from Probabilistic Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_6},
  doi          = {10.1007/978-3-642-30057-8\_6},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Schage12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Schage11,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Kenneth G. Paterson},
  title        = {Tight Proofs for Signature Schemes without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_12},
  doi          = {10.1007/978-3-642-20465-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Schage11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS11,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {A Standard-Model Security Analysis of {TLS-DHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JensenSS10,
  author       = {Meiko Jensen and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Towards an Anonymous Access Control and Accountability Scheme for
                  Cloud Computing},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010,
                  Miami, FL, USA, 5-10 July, 2010},
  pages        = {540--541},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CLOUD.2010.61},
  doi          = {10.1109/CLOUD.2010.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/JensenSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SchageS10,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {A New RSA-Based Signature Scheme},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_1},
  doi          = {10.1007/978-3-642-12678-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SchageS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerKSS10,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Masayuki Abe},
  title        = {Generic Compilers for Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_14},
  doi          = {10.1007/978-3-642-17373-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JagerKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SchageS10,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Radu Sion},
  title        = {A CDH-Based Ring Signature Scheme with Short Signatures and Public
                  Keys},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_12},
  doi          = {10.1007/978-3-642-14577-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SchageS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS10,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Generic Compilers for Authenticated Key Exchange (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Schage09,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Twin Signature Schemes, Revisited},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_10},
  doi          = {10.1007/978-3-642-04642-1\_10},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Schage09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ChenLGS08,
  author       = {Xuan Chen and
                  Christoph L{\"{o}}hr and
                  Sebastian Gajek and
                  Sven Sch{\"{a}}ge},
  title        = {Die Sicherheit von {MS} CardSpace und verwandten Single-Sign-On-Protokollen
                  - Browser-basierte Protokolle im Sicherheitscheck},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {32},
  number       = {8},
  pages        = {515--519},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11623-008-0123-7},
  doi          = {10.1007/S11623-008-0123-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ChenLGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/HelbachSS08,
  author       = {J{\"{o}}rg Helbach and
                  J{\"{o}}rg Schwenk and
                  Sven Sch{\"{a}}ge},
  editor       = {Robert Krimmer and
                  R{\"{u}}diger Grimm},
  title        = {Code Voting with Linkable Group Signatures},
  booktitle    = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
                  f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
                  Castle Hofen, Bregenz, Austria},
  series       = {{LNI}},
  volume       = {{P-131}},
  pages        = {209--221},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/29183},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/HelbachSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/GuneysuPS07,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar and
                  Sven Sch{\"{a}}ge},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {Efficient Hash Collision Search Strategies on Special-Purpose Hardware},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_4},
  doi          = {10.1007/978-3-540-88353-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/GuneysuPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics